WildPressure APT Hackers Uses New Malware to Attack Both Windows & macOS Operating Systems


WildPressure has been assaulting Windows for a very long time, thats why this is not the first time when Windows and macOS operating systems are being assaulted by such destructive trojan.

Nevertheless, in 2019 Kaspersky had actually identified a malicious trojan named “Milum” that has actually been used by the hazard stars of WildPressure..

The Trojan normally enables the risk stars to acquire push-button control of the devices that have actually been compromised in the attack.

Because then Kaspersky has been tracking the Milum Trojan, and just recently the threat stars have used a more recent version of this Trojan to assault both Windows and macOS operating systems.

According to the report, WildPressure was at first kept in mind in March 2020 based upon a malware operation appointing a fully-featured C++ Trojan “Milum”.

Why its called Milum & & its of interest?

Even the scientists also noted that all these concentration functions are required for C2 interaction, however when it comes to standalone applications, exportation does not need.

Apart from this, another point is that this malware normally exports lots of Zlib concentration functions, like zlibVersion(), inflate(), or deflate()..

Throughout an examination, the professionals brought out some key details regarding the attack. According to the analysis, the word milum is used in the C++ class names that exist inside the malware, thus the trojan was called Milum.

Who was attacked & & whos behind it?

Files MD50C5B15D89FDA9BAF446B286C6F97F53517B1A05FC367E52AADA7BDE07714666BA76991F15D6B4F43FBA419ECA1A8E741Original file names are Milum46_Win32. exe; on the target side they exist as system32.exe.

The Milum trojan has actually at first attacked the operating system of Windows and macOS, and it has been assaulting the system since 2019. After investigating the attack, the specialists kept in mind that a huge majority of IPs belong to the Middle East.

And all the information that has actually been hijacked were stored in the binarys resource section and it has been examined with Standard Template Library (STL) functions..

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity and hacking news updates.

Moreover, the scientists likewise claimed that it is rather challenging to find that who was behind this, as the hazard stars have utilized a really common C++ code.

Not just this, but the experts have likewise noticable that they believe that network scanners, TOR exit nodes, or VPN connections likewise came from the Middle East.

Indicators of compromise.

URLsupiserversys1212 [172/page/view. 86/page/view.

Apart from this the analysis also verified that the setup information and communication procedure that the malware has utilized in the attack are base64-encoded JSON-formatted setup.

As the investigation is going the experts are finding the crucial details, such as the WildPressure also utilized Python as a shows language for its malware in this attack..

The experts, yet not confirmed that who is behind this attack, however they are attempting their finest to find each crucial detail..

URLsupiserversys1212 [172/page/view. 86/page/view.

So, thats why they declared that they will keep monitoring the malware carefully up until and unless they dont get all the information.